Phishing Template Generation Made Easy
☆165Nov 27, 2017Updated 8 years ago
Alternatives and similar repositories for SimplyTemplate
Users that are interested in SimplyTemplate are comparing it to the libraries listed below
Sorting:
- Phishing Scenarios Used for Phishing Frenzy☆208Oct 30, 2019Updated 6 years ago
- Email recon made fast and easy, with a framework to build on☆953Jan 12, 2023Updated 3 years ago
- Lazykatz is an automation developed to extract credentials from remote targets protected with AV and/or application whitelisting software…☆200Nov 19, 2017Updated 8 years ago
- ☆84May 19, 2015Updated 10 years ago
- Cobalt Strike SCT payload obfuscator☆143Jul 7, 2017Updated 8 years ago
- Use ExpiredDomains.net and BlueCoat to find useful domains for red team.☆183Jun 10, 2022Updated 3 years ago
- Powershell module to assist in attacking Exchange/Outlook Web Access☆182Sep 22, 2016Updated 9 years ago
- Bash one-liner that will parse harmj0y's SharpRoast or Rebeus kerberoast into hashcat crack-able format.☆32Feb 28, 2019Updated 7 years ago
- Cobalt Strike cna script for randomized argument spoofing☆51Apr 4, 2019Updated 6 years ago
- A C# tool to search through a running instance of Outlook for keywords☆111Jan 14, 2021Updated 5 years ago
- Tools for harvesting email addresses for phishing attacks |☆85Sep 9, 2015Updated 10 years ago
- Extracts all base64 ticket data from a rubeus /dump file and converts the tickets to ccache files for easy use with other tools.☆66Oct 3, 2020Updated 5 years ago
- Search for categorized domain☆453Jan 15, 2019Updated 7 years ago
- ☆16Apr 17, 2021Updated 4 years ago
- C# Targeted Attack Reconnissance Tools☆120Jan 11, 2021Updated 5 years ago
- WePWNise generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application cont…☆351Aug 27, 2018Updated 7 years ago
- ☆78May 24, 2018Updated 7 years ago
- A ton of helpful tools☆344Oct 8, 2021Updated 4 years ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆526Apr 14, 2023Updated 2 years ago
- FiercePhish is a full-fledged phishing framework to manage all phishing engagements. It allows you to track separate phishing campaigns,…☆1,408Jan 9, 2024Updated 2 years ago
- Encode powershell payload into bat files☆155Feb 1, 2018Updated 8 years ago
- ☆182Feb 21, 2022Updated 4 years ago
- Subdomain brute force focused on speed and data serialization☆75Dec 27, 2022Updated 3 years ago
- Powershell C2 Server and Implants☆575Nov 11, 2019Updated 6 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆383Aug 17, 2018Updated 7 years ago
- Generates anti-sandbox analysis HTA files without payloads☆120Mar 16, 2017Updated 8 years ago
- PowerShell Empire Web Interface☆330May 20, 2023Updated 2 years ago
- Auto-generate an HTaccess for payload delivery -- automatically pulls ips/nets/etc from known sandbox companies/sources that have been se…☆170Aug 10, 2020Updated 5 years ago
- Aggressor scripts for phases of a pen test or red team assessment☆184Aug 13, 2024Updated last year
- ☆67Dec 19, 2018Updated 7 years ago
- When CactusTorch meets WebDavDelivery and obfuscation☆63Sep 19, 2017Updated 8 years ago
- This repo is for WMIOps, a powershell script which uses WMI for various purposes across a network.☆388Jun 25, 2024Updated last year
- Malicious Macro Generator☆828Apr 17, 2019Updated 6 years ago
- SharpCompile is an aggressor script for Cobalt Strike which allows you to compile and execute C# in realtime. This is a more slick approa…☆290Aug 7, 2020Updated 5 years ago
- ☆228Mar 30, 2022Updated 3 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆315Mar 24, 2018Updated 7 years ago
- ☆139Jul 13, 2017Updated 8 years ago
- CobaltStrike External C2 for Websockets☆197Jul 16, 2019Updated 6 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago